-
1
-
-
45749145729
-
-
[11/24/2006]. Bundesamt für Sicherheit in der Informationstechnik (BSI). Kosten und nutzen der IS-Sicherheit, Studie des BSI zur Technikfolgen-Abschätzung
-
Berinato, P.: Finally, a real return on security spending, http://www.cio.com/archive/021502/security.html [11/24/2006]. Bundesamt für Sicherheit in der Informationstechnik (BSI). Kosten und nutzen der IS-Sicherheit, Studie des BSI zur Technikfolgen-Abschätzung, 2000.
-
(2000)
Finally, a Real Return On Security Spending
-
-
Berinato, P.1
-
2
-
-
0036036577
-
Security attribute evaluation method: A cost-benefit approach
-
W. Tracz (ed.), Orlando, FL
-
Butler, S. "Security attribute evaluation method: a cost-benefit approach," Proceedings of the 24th International Conference on Software Engineering, W. Tracz (ed.), Orlando, FL, 2002, pp. 232-240.
-
(2002)
Proceedings of the 24th International Conference On Software Engineering
, pp. 232-240
-
-
Butler, S.1
-
3
-
-
4243109556
-
A model for evaluating is security investments
-
Cavusoglu, H., Mishra, B. and Raghunathan, P. "A model for evaluating is security investments," Communications of the ACM (47:1), 2004, pp. 87-92.
-
(2004)
Communications of the ACM
, vol.47
, Issue.1
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, P.3
-
4
-
-
84990029315
-
The economics of information security investment
-
Gordon, L. A. and Loeb, M. P. "The economics of information security investment," ACM Transactions on Information and System Security (5:4), 2002, pp. 438-457.
-
(2002)
ACM Transactions On Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
5
-
-
84990029315
-
The economics of information security investement
-
Gordon, L., Loeb, M. P. "The economics of information security investement," ACM Transactions on Information and System Security (5:4), 2002, pp. 438-457.
-
(2002)
ACM Transactions On Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.1
Loeb, M.P.2
-
6
-
-
33745210521
-
Budgeting process for information security expenditures
-
Gordon, L., Loeb, M. P. "Budgeting process for information security expenditures," Communications of the ACM (49:1), 2005, pp. 121-125.
-
(2005)
Communications of the ACM
, vol.49
, Issue.1
, pp. 121-125
-
-
Gordon, L.1
Loeb, M.P.2
-
8
-
-
0001972371
-
Risk Analysis in Capital Investment
-
Hertz, D. B. "Risk Analysis in Capital Investment." Harvard Business Review (42:1), 1964, pp. 95-106.
-
(1964)
Harvard Business Review
, vol.42
, Issue.1
, pp. 95-106
-
-
Hertz, D.B.1
-
9
-
-
62349096198
-
CIM-Investitionen sind keine Glaubensfragen
-
Kaplan, R. P. "CIM-Investitionen sind keine Glaubensfragen," Harvard Manager (9:3), 1986, pp. 78-85.
-
(1986)
Harvard Manager
, vol.9
, Issue.3
, pp. 78-85
-
-
Kaplan, R.P.1
-
13
-
-
4243150787
-
Analysing security costs
-
Mercury, R. T. "Analysing security costs," Communications of the ACM (46:6), 2003, pp. 15-18.
-
(2003)
Communications of the ACM
, vol.46
, Issue.6
, pp. 15-18
-
-
Mercury, R.T.1
-
15
-
-
84994725444
-
Business process-based valuation of IT-security
-
K. Sullivan (ed.), St. Louis, MO
-
Neubauer, T., Klemen, M. and Biffl, S. "Business process-based valuation of IT-security," Proceedings of the seventh international workshop on Economics-driven software engineering research, K. Sullivan (ed.), St. Louis, MO, 2005, pp. 1-5.
-
(2005)
Proceedings of the Seventh International Workshop On Economics-driven Software Engineering Research
, pp. 1-5
-
-
Neubauer, T.1
Klemen, M.2
Biffl, S.3
-
16
-
-
33750955475
-
Ansätze zur Evaluierung von Sicherheitsinvestitionen. Sicherheit 2005
-
Nowey, T., Federrath, H., Klein, C. and Plößl, K. "Ansätze zur Evaluierung von Sicherheitsinvestitionen. Sicherheit 2005", Beiträge der 2. Jahrestagung des GI-Fachbereichs Sicherheit, Lecture Notes in Informatics (P-62), 2005, pp. 15-26.
-
(2005)
Beiträge Der 2. Jahrestagung Des GI-Fachbereichs Sicherheit, Lecture Notes In Informatics (P-62)
, pp. 15-26
-
-
Nowey, T.1
Federrath, H.2
Klein, C.3
Plößl, K.4
-
17
-
-
84870202173
-
-
Auerbach Publications, Boca Raton
-
Peltier, T. R. Information security risk analysis, Auerbach Publications, Boca Raton, 2001, pp. 5, 254.
-
(2001)
Information Security Risk Analysis
, vol.254
, pp. 5
-
-
Peltier, T.R.1
-
18
-
-
62349096523
-
Aligning information security investments with a firm's risk tolerance
-
M. E. Whitman (ed.), Kennesaw, GA,2005
-
Rodewald, G. "Aligning information security investments with a firm's risk tolerance," Proceedings of the 2nd annual conference on Information security curriculum development, M. E. Whitman (ed.), Kennesaw, GA,2005, pp. 139-141.
-
Proceedings of the 2nd Annual Conference On Information Security Curriculum Development
, pp. 139-141
-
-
Rodewald, G.1
-
19
-
-
70349655820
-
-
Working paper, New York
-
Sonnenreich, W., Albanese, J. and Stout, B. "Return on security investment (ROSI). A practical quantitative model," Working paper, New York, 2005.
-
(2005)
Return On Security Investment (ROSI). a Practical Quantitative Model
-
-
Sonnenreich, W.1
Albanese, J.2
Stout, B.3
-
21
-
-
84870157912
-
-
R. Qiu (Editor), Hershey, PA, USA
-
vom Brocke, J., (2007): Service Portfolio Measurement (SPM), A Decision Support System for the Management of Service- Oriented Information Systems, Enterprise Service Computing from Concept to Deployment. R. Qiu (Editor), Hershey, PA, USA 2007, pp. 58-90.
-
(2007)
Service Portfolio Measurement (SPM), a Decision Support System For the Management of Service- Oriented Information Systems, Enterprise Service Computing From Concept to Deployment
, pp. 58-90
-
-
Vom Brocke, J.1
|